Our research deals with the role of theatrical decoration in creating visual thumbs and the effect achieved as a result in the theatrical presentation in terms of supporting the idea of centralization of the dramatic construction of the show, as the researcher emphasizes that this topic has begun with a new horizon removed many technical concepts and knowledge in the theater.
Horizon knowledge and discoveries based on the structures of light and sight to achieve an existing transformation from steel to ethereal. According to these new concepts, systems other than those based on old methods of presentation have been formed.
In light of this, the researcher divided his research into:
First: the problem of research and the need for it. The researcher asked the problem a number of questions, the most important of which is: how does the illusion in the theater affect the phenomenon of receiving. He also set his goal of revealing the visual illusion in contemporary theatrical décor. He linked the importance of research in the fact that it benefits scholars and workers in the theatrical production industry.
The researcher addressed in the second chapter (cognitive framework) the structure of illusion in theatrical decoration based on the image in the visual art is considered to be deceptive and shaded and the information is collected by the sense of sight and then treated by the brain . Where the illusion of reading the image occurs through the theoretical manipulation of the drawing of the work.
In the last chapter, the researcher adopted the descriptive analytical method of reading the levels of the sample and the directing treatment and the role of visual deception in the illusion achieved in the research and his awareness of the play (Facebook) which was presented on the national stage in Baghdad in March 2011 by the preparation and directing (Imad Mohammed) and representation (Mohammed Hashem), and then reached the researcher at the end of his research to the most important results and the most prominent conclusions and sealed the list of sources and references on which he relied.
The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.
This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show MoreA sensitive and environmentally benign spectrometric method was developed for quantifying Meprobamate (MEP). The analyzed MEP was derivatized into a colored complex and determined spectrometrically. The colorimetric analytical parameters were optimized and validated. Low limit of detection (LOD) was achieved down to 1.88×10-6 mol/l while the limit of quantification (LOQ) was extended over the range of 1.97×10-6 - 1.35×10-3 mol/l. The high precision has been denoted by the 1.54% value of the coefficient of variation. The recovery was 96.07%, while the RSD (n=3) was 1.05 - 1.19%. The apparent molar absorptivity (Æ) obtained within 1154.7 - 1691.9 L.mol-1.cm
... Show MoreIn this paper, we analyze several aspects of a hyperbolic univalent function related to convexity properties, by assuming to be the univalent holomorphic function maps of the unit disk onto the hyperbolic convex region ( is an open connected subset of). This assumption leads to the coverage of some of the findings that are started by seeking a convex univalent function distortion property to provide an approximation of the inequality and confirm the form of the lower bound for . A further result was reached by combining the distortion and growth properties for increasing inequality . From the last result, we wanted to demonstrate the effect of the unit disk image on the condition of convexity estimation
... Show MoreThe seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MoreSummary:
OBJECTIVE Many associations have been found between specific HLA antigens and increased susceptibility to various diseases . So we tried to associate class I and class II antigens with acute lymphoblastic leukemia . We also demonstrate the presence of antibodies in serum of acute lymphoblastic leukemic patients against HLA class I.
DESIGN: Prospective study.
SETTING: Tissue typing and histocompatibility center at Al- Karamah Teaching Hospital. PATIENTS AND METHOD: 70 acute lymphoblastic leukemia patients from pediatric hospitals. HLA ( human leukocyte antigens) typing done for them by serological method and cross matching and blood grouping were also done for them.
RESULTS: there was significant difference between pa
There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.